How It Works
It's That Easy.™
CyberPoint Electronic Tags
A CyberPoint is an electronic tag that functions as a data checkpoint for security guard tours and can be installed virtually anywhere. Like a traditional guard tour system, security team members confirm their presence at a location by touching a CyberKey to a CyberPoint.
When a CyberKey is presented to a communication device, a complete record of the guard tour is uploaded into the management software. Reports can then be generated, e-mailed and analyzed.
A significant advantage over traditional guard tour applications is that the CyberPoint is part of the CyberLock access control system. The same CyberKey a guard uses to verify their location can also be loaded with access permissions to open designated CyberLock cylinders.
CyberPoints also include a Temporary Activation feature that enables them to reactivate an expired CyberKey. When a key touches a CyberPoint with this feature activated, it can now access designated CyberLock cylinders. The activation will time out after eight seconds or five minutes depending on which activation preference is configured.
• Each CyberPoint is manufactured with a unique ID which cannot be changed or duplicated
• CyperPoints contain encrypted access codes that identify the system to which they belong
• No wiring or battery is required
• A CyberPoint is energized by the battery in the key
• Guard tour monitoring can proceed even during power outages
• CyberPoints record the last 1100 events in memory
• CyberPoints contain a list of lost/stolen keys to prevent lost keys from gaining access
How is a CyberPoint different from a CyberLock? CyberPoints and CyberLock cylinders have the same electronics package. CyberPoints are essentially cylinders without the lock pin mechanisms.
Can I use it outdoors? Yes, the electronics are sealed for installation indoors and out.
How is a CyberPoint programmed and how does it communicate with the software? CyberPoints are most commonly programmed with the Grand Master CyberKey. CyberKeys “carry” CyberPoint (and lock) data back to the software through Communicators.